Sciweavers

226 search results - page 36 / 46
» Extensional Theories and Rewriting
Sort
View
105
Voted
EDBT
2008
ACM
137views Database» more  EDBT 2008»
16 years 17 days ago
Optimizing away joins on data streams
Abstract. Monitoring aggregates on IP traffic data streams is a compelling application for data stream management systems. Often, such streaming aggregation queries involve joining...
Lukasz Golab, Theodore Johnson, Nick Koudas, Dives...
102
Voted
CSL
2007
Springer
15 years 6 months ago
Unbounded Proof-Length Speed-Up in Deduction Modulo
In 1973, Parikh proved a speed-up theorem conjectured by G¨odel 37 years before: there exist arithmetical formulæ that are provable in first order arithmetic, but whose shorter ...
Guillaume Burel
123
Voted
CSFW
1999
IEEE
15 years 4 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
80
Voted
DLT
2004
15 years 1 months ago
On Competence in CD Grammar Systems
Abstract. We investigate the generative power of cooperating distributed grammar systems (CDGSs), if the cooperation protocol is based on the level of competence on the underlying ...
Maurice H. ter Beek, Erzsébet Csuhaj-Varj&u...
117
Voted
VLDB
2011
ACM
245views Database» more  VLDB 2011»
14 years 7 months ago
Normalization and optimization of schema mappings
Schema mappings are high-level specifications that describe the relationship between two database schemas. They are an important tool in several areas of database research, notab...
Georg Gottlob, Reinhard Pichler, Vadim Savenkov